Re: Usability of Cryptography (was Re: More FUD from First Virtual)
If we stick to a lesser goal -- constancy of identity --
From: IN%"jamesd@echeque.com" "James A. Donald" 13-DEC-1995 03:44:41.99 this is not so hard. In general it is impossible to prove that Bryce is the "real" Bryce, but it is trivial to prove that Bryce is the same Bryce who has a certain Web page, and the same Bryce who posted a certain article in archives. ----------------- I have been considering all the pieces of information that ought to be automatically linkable to a particular public key. They include: 1. Email address(es) from which mail signed with it is customarily received, to save on lookup time. 2. Web pages put up by this person. 3. Web pages/ftp files/etcetera authored by this person (i.e., the hks archives of cypherpunks). 4. Phone number if using a crypto-capable phone with a key-download capacity from a computer. 5. A declared name or alias. 6. In my files, whatever name I want to give the person. Ultimately, if I receive something signed by somebody, I would want to have hypertext links from that file to all of these- to remind me of whom I'm talking to and his/her/its/their past behavior. -Allen
participants (1)
-
E. ALLEN SMITH